Class information for:
Level 1: ACCESS CONTROL//RBAC//ROLE BASED ACCESS CONTROL

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
10353 1071 24.6 22%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
20 3       COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING 118625
1665 2             PEER TO PEER//PEER TO PEER NETWORKS//PEER-TO-PEER NETWORKING AND APPLICATIONS 6842
10353 1                   ACCESS CONTROL//RBAC//ROLE BASED ACCESS CONTROL 1071

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ACCESS CONTROL authKW 1278682 20% 21% 210
2 RBAC authKW 1269254 6% 70% 64
3 ROLE BASED ACCESS CONTROL authKW 719888 5% 51% 50
4 XACML authKW 410028 2% 55% 26
5 ACCESS CONTROL MODEL authKW 320724 1% 75% 15
6 ROLE MINING authKW 273686 1% 80% 12
7 AUTHORIZATION authKW 267865 4% 21% 44
8 CONTROLLED QUERY EVALUATION authKW 256586 1% 100% 9
9 SEPARATION OF DUTY authKW 215596 1% 69% 11
10 SECURE INTEROPERATION authKW 202733 1% 89% 8

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 41042 51% 0% 542
2 Computer Science, Theory & Methods 23226 41% 0% 434
3 Computer Science, Software Engineering 17993 30% 0% 322
4 Computer Science, Hardware & Architecture 6119 14% 0% 146
5 Computer Science, Artificial Intelligence 2284 13% 0% 134
6 Telecommunications 1060 9% 0% 95
7 Computer Science, Interdisciplinary Applications 289 5% 0% 54
8 Engineering, Electrical & Electronic 265 12% 0% 125
9 Logic 140 1% 0% 9
10 Medical Informatics 44 1% 0% 10

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 CERIAS 64769 1% 15% 15
2 NESTOR 64145 0% 75% 3
3 COMPETENCE IT SECUR 57019 0% 100% 2
4 COORDINAMENTO PROGETTI INTERSETTORIALI 57019 0% 100% 2
5 INTERNET TECHNOL PLICAT 57019 0% 100% 2
6 MULTIMEDIA SERV SECUR CERTIFICAT 57019 0% 100% 2
7 INFORMAT EC 57015 0% 50% 4
8 MATHS COMP 57011 1% 33% 6
9 SECUR ENGN FUTURE COMP 38011 0% 67% 2
10 ADVANCE NETWORKING 28510 0% 100% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 94234 2% 13% 25
2 COMPUTERS & SECURITY 57284 5% 4% 49
3 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 57174 2% 8% 24
4 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 23670 2% 4% 20
5 LECTURE NOTES IN COMPUTER SCIENCE 19688 23% 0% 248
6 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 7393 3% 1% 28
7 COMPUTER STANDARDS & INTERFACES 5850 1% 1% 16
8 DATA & KNOWLEDGE ENGINEERING 4523 1% 1% 14
9 INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS 4083 1% 2% 7
10 COMPUTER SYSTEMS SCIENCE AND ENGINEERING 3787 1% 1% 10

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 ACCESS CONTROL 1278682 20% 21% 210 Search ACCESS+CONTROL Search ACCESS+CONTROL
2 RBAC 1269254 6% 70% 64 Search RBAC Search RBAC
3 ROLE BASED ACCESS CONTROL 719888 5% 51% 50 Search ROLE+BASED+ACCESS+CONTROL Search ROLE+BASED+ACCESS+CONTROL
4 XACML 410028 2% 55% 26 Search XACML Search XACML
5 ACCESS CONTROL MODEL 320724 1% 75% 15 Search ACCESS+CONTROL+MODEL Search ACCESS+CONTROL+MODEL
6 ROLE MINING 273686 1% 80% 12 Search ROLE+MINING Search ROLE+MINING
7 AUTHORIZATION 267865 4% 21% 44 Search AUTHORIZATION Search AUTHORIZATION
8 CONTROLLED QUERY EVALUATION 256586 1% 100% 9 Search CONTROLLED+QUERY+EVALUATION Search CONTROLLED+QUERY+EVALUATION
9 SEPARATION OF DUTY 215596 1% 69% 11 Search SEPARATION+OF+DUTY Search SEPARATION+OF+DUTY
10 SECURE INTEROPERATION 202733 1% 89% 8 Search SECURE+INTEROPERATION Search SECURE+INTEROPERATION

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 MITRA, B , SURAL, S , VAIDYA, J , ATLURI, V , (2016) A SURVEY OF ROLE MINING.ACM COMPUTING SURVEYS. VOL. 48. ISSUE 4. P. - 16 80% 1
2 MIRABI, M , IBRAHIM, H , FATHI, L , UDZIR, NI , MAMAT, A , (2015) A DYNAMIC COMPRESSED ACCESSIBILITY MAP FOR SECURE XML QUERYING AND UPDATING.JOURNAL OF INFORMATION SCIENCE AND ENGINEERING. VOL. 31. ISSUE 1. P. 59 -93 14 93% 0
3 FATIMA, A , GHAZI, Y , SHIBLI, MA , ABASSI, AG , (2016) TOWARDS ATTRIBUTE-CENTRIC ACCESS CONTROL: AN ABAC VERSUS RBAC ARGUMENT.SECURITY AND COMMUNICATION NETWORKS. VOL. 9. ISSUE 16. P. 3152 -3166 12 92% 0
4 BEN FADHEL, A , BIANCULLI, D , BRIAND, L , (2015) A COMPREHENSIVE MODELING FRAMEWORK FOR ROLE-BASED ACCESS CONTROL POLICIES.JOURNAL OF SYSTEMS AND SOFTWARE. VOL. 107. ISSUE . P. 110 -126 12 75% 0
5 LU, JF , JOSHI, JBD , JIN, L , LIU, YD , (2015) TOWARDS COMPLEXITY ANALYSIS OF USER AUTHORIZATION QUERY PROBLEM IN RBAC.COMPUTERS & SECURITY. VOL. 48. ISSUE . P. 116 -130 9 100% 0
6 LUO, B , LEE, D , LEE, WC , LIU, P , (2011) QFILTER: REWRITING INSECURE XML QUERIES TO SECURE ONES USING NON-DETERMINISTIC FINITE AUTOMATA.VLDB JOURNAL. VOL. 20. ISSUE 3. P. 397-415 9 100% 4
7 MITRA, B , SURAL, S , VAIDYA, J , ATLURI, V , (2016) MINING TEMPORAL ROLES USING MANY-VALUED CONCEPTS.COMPUTERS & SECURITY. VOL. 60. ISSUE . P. 79 -94 9 90% 0
8 ARKOUDAS, K , CHADHA, R , CHIANG, J , (2014) SOPHISTICATED ACCESS CONTROL VIA SMT AND LOGICAL FRAMEWORKS.ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY. VOL. 16. ISSUE 4. P. - 10 83% 1
9 BISKUP, J , WEIBERT, T , (2008) KEEPING SECRETS IN INCOMPLETE DATABASES.INTERNATIONAL JOURNAL OF INFORMATION SECURITY. VOL. 7. ISSUE 3. P. 199 -217 10 91% 6
10 GOUGLIDIS, A , MAVRIDIS, I , HU, VC , (2014) SECURITY POLICY VERIFICATION FOR MULTI-DOMAINS IN CLOUD SYSTEMS.INTERNATIONAL JOURNAL OF INFORMATION SECURITY. VOL. 13. ISSUE 2. P. 97 -111 9 82% 5

Classes with closest relation at Level 1



Rank Class id link
1 28189 TRUST NEGOTIATION//AUTOMATED TRUST NEGOTIATION//SOFTWARE TRUSTWORTHINESS
2 20701 INFORMATION FLOW CONTROL//BYTECODE VERIFICATION//LANGUAGE BASED SECURITY
3 28047 HIMALIS//FUTURE NETWORK//NEW GENERATION NETWORK
4 30058 USER BEHAVIOR SIMILARITY//LOCATION PROXIMITY//WEB BASED SOCIAL NETWORKS
5 25699 USER HIERARCHY//KEY ASSIGNMENT//CRYPTOGRAPHIC KEY ASSIGNMENT
6 34337 CLIENT SERVER TRANSACTIONS//COARSELY INTEGRATED OPERAND SCANNING CIOS//COMPATIBILITY PRE ADOPTION CONSTRUCT
7 21594 ONTOLOGY BASED MANAGEMENT//KDEG//AUTONOMIC NETWORKING
8 37084 BATTERY POWER EFFICIENCY BPE//MIGRATORY INTERFACES//SOFTWARE ARCHITECTU
9 20171 ELECTRONIC PATIENT RECORD//INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS//EUROMED ETS
10 26847 FEATURE INTERACTION//CALL PROCESSING LANGUAGE//FEATURE INTERACTION DETECTION

Go to start page